The event has been recorded and published on YouTube: .
Check Accepted Papers and Keynotes to access all the published material for each presentation.

** Timezone: Eastern European Time (EET) **

Day 1: Monday 29.11 (09.45-13.20)

  • 09.45-10.00 Opening

  • 10.00-10.45 Keynote A: Future Perspectives of Privacy-Preserving Machine Learning

    Presenter: Rafael Dowsley, Monash University, Australia

Break (15min)

Session 1.1: Machine Learning and Security (11.00-11.40)

Chair: Antonis Michalas

  • 11.00-11.20 SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure

  • 11.20-11.40 Secure Collaborative Learning for Predictive Maintenance in Optical Networks

Break (10min)

Session 1.2: Trust (11.50-12.30)

Chair: Cesar Pereida Garcia

  • 11.50-12.10 Trusted Sockets Layer: a TLS 1.3 based trusted channel protocol

  • 12.10-12.30 Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code

Break (10min)

Session 1.3: Network Security (12.40-13.20)

Chair: Juha Nurmi

  • 12.40-13.00 Gollector: Measuring Domain Name Dark Matter from Different Vantage Points

  • 13.00-13.20 Adversarial trends in mobile communication systems: From attack patterns to potential defenses strategies

End of Day#1

Day 2: Tuesday 30.11 (10.00-13.10)

  • 10.00-10.45 Keynote B: Far beyond (or nearer) trust: addressing the main challenges associated to privacy protection and security management in the data era

    Presenter: David Arroyo, ITEFI-CSIC, Spain

Break (15min)

Session 2.1: Applied Cryptography (11.00-12.00)

Chair: Alexandros Bakas

  • 11.00-11.20 Communicating Through Subliminal-Free Signatures

  • 11.20-11.40 Size, Speed, and Security: An Ed25519 Case Study

  • 11.40-12.00 Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones

Break (15min)

Session 2.2: Security in Internet of Things (12.15-12.55)

Chair: Eugene Frimpong

  • 12.15-12.35 X-Pro: Distributed XDP Proxies against Botnets of Things

  • 12.35-12.55 Industrialising Blackmail: Privacy Invasion Based IoT Ransomware

  • Closing Remarks

    End of Conference